From: Tony Luck Date: Tue, 19 Apr 2022 21:19:21 +0000 (-0700) Subject: ACPI, APEI, EINJ: Refuse to inject into the zero page X-Git-Tag: v5.19-rc1~183^2^2 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=ab59c89396c007c360b1a4d762732d1621ff5456;p=thirdparty%2Fkernel%2Flinux.git ACPI, APEI, EINJ: Refuse to inject into the zero page Some validation tests dynamically inject errors into memory used by applications to check that the system can recover from a variety of poison consumption sceenarios. But sometimes the virtual address picked by these tests is mapped to the zero page. This causes additional unexpected machine checks as other processes that map the zero page also consume the poison. Disallow injection to the zero page. Signed-off-by: Tony Luck Signed-off-by: Rafael J. Wysocki --- diff --git a/drivers/acpi/apei/einj.c b/drivers/acpi/apei/einj.c index 95cc2a9f3e058..d4326ec12d296 100644 --- a/drivers/acpi/apei/einj.c +++ b/drivers/acpi/apei/einj.c @@ -549,6 +549,9 @@ static int einj_error_inject(u32 type, u32 flags, u64 param1, u64 param2, !arch_is_platform_page(base_addr))) return -EINVAL; + if (is_zero_pfn(base_addr >> PAGE_SHIFT)) + return -EADDRINUSE; + inject: mutex_lock(&einj_mutex); rc = __einj_error_inject(type, flags, param1, param2, param3, param4);